The Internet Patrol default featured image
Continue Reading

Fake Microsoft Email Urges Windows Update, Installs Trojan Wupdate-20050401.exe

A fake Microsoft email urges users to install the latest Windows update, and even links and takes them to a site which sure seems to be a real Microsoft website. But it isn’t. And the email actually leads to the installation of a trojan horse file. The payload file is…

The Internet Patrol default featured image
Continue Reading

Unexpected Online Greeting Cards May Carry Trojan Horses

The SANS Institute’s Internet Storm Center (ISC) has issued a warning about Internet greeting cards or postcards which bear links leading to Trojan Horse programs. Like the original Trojan Horse, these salutations carry a cargo designed to infiltrate, in this case, your computer. Wrote the ISC’s Greg Shipley: We’re receiving…

The Internet Patrol default featured image
Continue Reading

Firefox “Lambda Replace Heap Memory” Security Flaw Reveals Sensitive User Information

A security flaw known as the “JavaScript Lambda Replace Heap Memory Disclosure Vulnerability” has been found in the popular Firefox web browser. Firefox is an open source web browser which is available for Windows, OS X, and Linux, and which has experienced significant adoption in the past 18 months. The…

The Internet Patrol default featured image
Continue Reading

Beware Modem Hijacking – NY First State to Outlaw This Act of Remote Thievery

Although modem hijacking (also known as “modem jacking”) is not entirely new, New York State is set to become the first state to outlaw the practice. Modem jacking is when someone hijacks your modem and uses it to make long distance (usually international) telephone calls, or calls to premium phone…

The Internet Patrol default featured image
Continue Reading

Windows XP and 2000 Users Beware – New “High Risk” Flaws in Outlook and Internet Explorer

Newly discovered flaws in both Outlook and Internet Explorer (IE) were uncovered and announced over the weekend. The security holes are considered to be especially “high risk” in part because they require little to no user interaction in order for a third-party to exploit them. The security flaws exist in…

The Internet Patrol default featured image
Continue Reading

Screwed If You Do, Screwed If You Don’t – Windows Update Causes Crashes (KB891711)

A recent security update to Microsoft Windows, MS05-002 KB891711, is causing crashes for a lot of Windows 98 and Windows ME users, leading to issues with IE, blue screens of death and even, some are reporting, a black screen of death. The MS05-002 KB891711 security patch, released in January, was…

The Internet Patrol default featured image
Continue Reading

One Stolen Laptop Leads to Personal Data Risk for Nearly 100,000 at UC Berkeley

Quick, what would you say is the most obvious way for data to end up in the wrong hands? If you said “having the laptop on which it resides stolen”, give yourself a pat on the back. Now quick, what is one of the most preventable forms of data theft?…

The Internet Patrol default featured image
Continue Reading

Trillian Vulnerability – Security Flaw Found in Trillian IM Client

CNet news is reporting today that a potentially serious security flaw has been found in the Trillian instant messaging client. Trillian is an instant messaging (IM) software which allows users to interact with people using many different IM services, such as AOL Instant Messenger and MSN Messenger, using just one…

The Internet Patrol default featured image
Continue Reading

Apple Releases New Batch of Patches, Fixes International Domain Names Phishing Flaw in Safari

Apple has released nine new patches today, designed to patch and repair several flaws in the standard OS X operating system and programs. One of the most critical of these is the flaw which allows phishers to take advantage of browsers which support the International Domain Name standard. Safari is…

The Internet Patrol default featured image
Continue Reading

New Internet Explorer Attack by “Integrated Search Technologies” Works Even if IE is Closed!

A new type of attack on Internet Explorer has been discovered this week, and this attack works even if IE is closed! The way that it works is that a user visits an infected site, is given a pop-up window asking them to install an applet from Integrated Search Technologies,…

The Internet Patrol default featured image
Continue Reading

ChoicePoint Syndrome: Lexis Nexis Hemorrhages Personal Information of Thousands to Identity Thieves

Lexis Nexis has been compromised and has hemorrhaged the personal information of tens of thousands of individuals whose data was stored with Lexis Nexis. Identity theft is a real possibilty for these people. Many will remember that this exact same thing happened to ChoicePoint just last month. Lexis Nexis, like…

The Internet Patrol default featured image
Continue Reading

What Do You Think ISPs Should Do About Their Customers with Infected and Infested PCs?

We all know that a large amount of spam comes through personal computers which are connected to the Internet, and which have been hijacked – turned into “zombies” – by viruses, Trojans and the like. But did you know that, according to SpamHaus, nearly 70% of all spam comes from…

The Internet Patrol default featured image
Continue Reading

Windows of Opportunity for ATM Fraud Increase as Wells Fargo Boots Up More than 6000 Windows ATMs

Well, Wells Fargo has done it. Back in November we told you about the increase in ATM machines running on Windows (yes, we realize that “ATM machines” is redundant, but many people know them by that name). Now Wells Fargo has announced that it has just completed switching 6,200 ATMs…

The Internet Patrol default featured image
Continue Reading

Digital Peeping Tom Spies on Girls Through Their Own Webcams

Remember the man who used his webcam and free webcam software to catch a burgler? In a twist, a peeping Tom has been caught spying on girls using their own webcams, connected to their own computers. He was able to do this thanks to the Subseven trojan. Spanish authorities have…

arrested handcuffs
Continue Reading

How to Get Yourself Into Trouble with the Camera on Your Phone

Remember that guy who used his camera phone to make a video of himself having sex with his girlfriend, (and can you imagine the logistics involved?), only to have the video show up in the corner porn shop, and on an Internet auction site? And the folks who use their camera phones for upskirting and downblousing, courting prison time in the process? We had thought that these were the height of camera phone stupidity – especially the guy who reached out and touched someone while filming it. But noooo…. That dubious honour now goes to…drum roll please…